Software Security
2011-2012 - IMT3501 - 10 ECTS

On the basis of

  • IMT1082 - Objekt-orientert programmering
  • IMT1121 - Innføring i informasjonssikkerhet
  • IMT2021 - Algoritmiske metoder
  • IMT2282 - Operativsystemer
  • IMT2431 - Datakommunikasjon og nettverkssikkerhet

Expected learning outcomes

After successful completion of the course the students have basic knowledge on how software kan be created and maintained with security in mind, i.e. deviation from expected functionality owing to interaction with an adversary. The students have an overview of existing techniques, classes of tools and the methods used in software development today. Students can apply their knowledge to problem cases in an industrial or research setting. They understand attack patterns, e.g. buffer overflows , format string  problems, command injection , and cross-site scripting . They are able to identify potential threats and vulnerabilities early in a program's lifecycle and apply measures that prevent or reduce vulnerabilities in software. The students succeed in presenting their analyses and approaches to other developers, superiors and customers.

Topic(s)

  • Software Assurance
  • Risk Analysis & Management
  • Secure Software Development Cycle
  • Coding Practices and Rules
  • Source Code Analysis
  • Security Testing
  • Attack Patterns
  • Malware

Teaching Methods

Lectures
Group works
Laboratory work
Mandatory assignments
Exercises
PBL (Problem Based Learning)
Tutoring

Form(s) of Assessment

Written exam, 3 hours

Grading Scale

Alphabetical Scale, A(best) – F (fail)

External/internal examiner

Evaluation by the lecturer

Re-sit examination

Ordinary re-sit examination

Examination support

All self-produced paper-based support is allowed up to four A4 sheets. The school can request that the sheets be copied on paper provided by the school.

Coursework Requirements

At least 6 obligatory exercises must be handed in. Hand-ins are marked by other students. Participants must mark as many exercises as they have handed in. If an exercise does not get a passing grade, the student can request that his exercise be marked by the lecturer.

Teaching Materials

  • Dowd, M., McDonald, J., and Schuh, J. (2006). The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. ISBN 0-321-44442-6. Library 005.8 Dow
  • Hoglund, G. and McGraw, G. (2004). Exploiting Software: How to Break Code. ISBN 0-201-78695-8. Library 005.8 Hog
  • McGraw, G. (2006). Software Security: Building Security in. ISBN 0-321-35670-5. Library 005.8 McG

Replacement course for

IMT3381 Applikasjonssikkerhet, IMT3571 Datasystemsikkerhet